Archive for
January, 2015

Windows 10 is just around the corner and with it brings a solution to a lot of the headaches caused by Windows 8 and 8.1. The much loved desktop environment makes a welcome return, unhampered by the lack of a start button or default settings to the “Metro” tablet environment. You will know this as the screen with all your apps in Win 8.1. It is also where you access the search function by pressing Win+Q. There is hardly enough space in one article to explain but there are a lot of changes coming in Windows 10.

One of the biggest changes will be the Internet Explorer browser. With two new engines driving it (they being the Javascript and rendering engines) there is a lot to hopefully look forward to. Will there be a popular swing back in favor of IE for die hard Chrome, FireFox or Safari users? That remains to be seen but hopefully it will play nicer with more websites. The previews and snapshots at least make it look better than previous versions and that will go a long way to improving user experience. They might just be taking heed from the likes of Google and Apple in the look and style of it. The code name for this project in Microsoft is “Spartan”.

Spartan

The next big thing is of course HoloLens, Microsoft’s answer to Google glass. It is being powered by an Intel processor chip and will work with a range of Microsoft products. Only a few people have had the chance to use the product themselves but it will be used in an augmented reality scenario with products such as Mine craft and Office. That is augmented reality as opposed to virtual reality (Oculus Rift) Neither does it seem farfetched that “Minority Report” style scenarios of typing on any surfaces and being recognised by computers by your iris is very far beyond the possibility for the ordinary person any more. If that seems implausible then we are certainly closer than ever before.

The third and final mention in this article will go to Cortana, and the integration of Cortana in to Internet Explorer and Windows 10. Cortana is the voice activation service created by Microsoft. It can be compared to Siri on Apple products. Google has also incorporated something similar in their Android devices. Along with eye recognition for authentication purposes (to prove who you are) we also may be looking at voice recognition. Cortana can be used to ask questions and make appointments and reminders. It can also be integrated with your calendar, location, schedule, etc. to act as a physical, human personal assistant in all but actuality.

There will be a desktop and tablet/mobile version available it seems and the line here will be drawn around the 8” tablet size and smaller. The details of this are still emerging. There will also be some free upgrades for users already on Windows 7, 8 and 8.1 until a year after its release. This is exciting news and if you want to know more please don’t hesitate to get in touch with us.

———————————————————————————-

If you are suffering from this or any other problem please don’t hesitate to call one of our qualified engineers. We will be delighted to help.

It’s that time of year again, time for some new beginnings and fresh starts. So whether you are the worst or the best at computers, we are going to show you some easy practices you can take up this year in order to maximize the benefit you get from your PC.

New Year Resolution

Passwords

You should have passwords for almost everything that you use on your computer. That includes websites, programs, folders, files, USBs, and even the computer itself. Far too often peoples passwords are too easily guessable like “secret”, “Mary1” or “123456”. They should be complex enough that they cannot be guessed easily, not appear in any dictionary but be memorable, preferably only by you. A complex password can contain any mix of numbers, letters, special characters or spaces. People usually have several different passwords for different websites and other things. A useful tool for keeping track of all your passwords by keeping them in a “Vault” is LastPass which you can read more about and download here . The website also offers a free tool for creating complex passwords here .

Email Habits

The way people use their email might also be somewhere to improve habits and practices. For example safe sender lists, subscriptions, contacts, spam settings, and various other measures can be taken to secure your email and the information within. Despite being around for nearly as long as computers have, email is still one of the most common ways to trick people in to falling for a computer scam.

Anti-Virus

A decent Anti-Virus package on your computer is a must as you not only need to think about what you do and where you go with your PC but also what other people are trying to get on to your PC. An Anti-Virus package can be tailored to your needs and will protect your PC when you are not there. Kaspersky, Norton, Symantec, AVG, McAfee as well as the security software that come with individual machines are just a few brands worth considering. Always keep your antivirus subscription up to date.

Software Updates

Upgrades to existing software are always coming out as the creators develop their product and also add features to protect it against an attack. This goes for Windows PCs as well as the programs that run on them. Watch out for notifications that your PC wants to update and do so as soon as is practical for you. As well as this, installing updates of the programs that are on your computer is always advisable.

Encryption

Encryption is another method you might use to protect your information. It can be used to protect your communications, files or hardware. If you have very sensitive information on a mobile PC such as a laptop or tablet then encryption is something you should look in to. If you work from home or on the move then encryption is relevant to you. Encryption is also critical when connecting to a secure website – make sure the padlock appears on your web browser before you enter any information into banking and other secure sites.

Social Media

Social Media offers a great service and a great tool for businesses to connect with their customer base. It has its own pitfalls however. These include cyber-bullying, identity theft and lack of productivity. Be safe on Social Media sites. Don’t “friend” or “connect” or “follow” anyone you don’t know in real life. For brevity sake, have a look at the movie “Catfish”, which is reviewed here .

Downloads

Be careful what you download. This extends to what links you click on and what sites you visit. It is possible that a link that appears as www.goodsite.com may in fact be leading you to www.badsite.com . A safe way to avoid this is by typing in the purported address in to your browser rather than clicking the link. Only download from trusted, reputable sites and especially be aware of any downloads that download files that end in .exe as they are windows applications that may run automatically on your computer.

Websites

This is more to do with the websites that you visit. Only visit websites that are from organisations that you trust. This is to ensure that you do not download anything dangerous by accident or become a victim of any kind of cyber crime via the website. Also, be aware of any changes to websites that you regularly visit and contact the website owners independently of the website contact information if you are worried about any changes. Finally, be wary of any website that you visit by clicking on links in your email. They are of course not all bad but caution is the best policy.

Devices

Make sure that your devices are maintained to ensure best performance. As well as following the advice above, keep the device clean and dust-free. Any unusual squeeks or other noises could indicate an impending problem, so talk to your IT support engineer before things get out of hand.

Network Routers

There is an outer edge to every computer network in every office or home and usually a router will sit on the boundary as the “gateway” for each computer to connect to the internet. To speak in battle terms, the router is your first line of defence against what is on the internet. These devices can be very unique. They can also be complex with many settings at your disposal. Often your Internet Service Provider (ISP) will give you one for free. This should be properly configured and secured for your individual needs.

We hope that you gathered some useful hints from reading this. Hopefully you will go forth and have a very secure, enjoyable year of computing in 2015. As always, if you have any questions or want to implement any of these resolutions then please do not hesitate to get in contact. We have the expertise and will be more than happy to tailor an IT Solution to your needs.